AODV is a reactive routing protocol for mobile ad hoc networks. It uses route discovery and maintenance to dynamically discover and maintain routes. Route discovery uses route request (RREQ) and route reply (RREP) messages to find routes between nodes. Route maintenance uses route error (RERR) messages to notify nodes of link breaks. Each node maintains a routing table with next hop and destination information.
he Optimized Link State Routing Protocol (OLSR)[1] is an IP routing protocol optimized for mobile ad hoc networks, which can also be used on other wireless ad hoc networks. OLSR is a proactive link-state routing protocol, which uses hello and topology control (TC) messages to discover and then disseminate link state information throughout the mobile ad hoc network. Individual nodes use this topology information to compute next hop destinations for all nodes in the network using shortest hop forwarding paths.
The Optimized Link State Routing Protocol (OLSR) is an IP routing protocol optimized for mobile ad hoc networks, which can also be used on other wireless ad hoc networks. OLSR uses hello and topology control (TC) messages to discover and then disseminate link state information throughout the mobile ad hoc network.
Contents which are covered here:
Classification of Ad-Hoc Routing Protocol
Link State Routing
Problems of Link State Routing
Optimized Link State Routing Protocol
1 Hop and 2 Hop Neighbors
Hello Packet
MPR Selection
Topology Table
MPR Information Declaration
*** Animated figure/diagram might not be visible in PDF view. Please consider it. ***
OLSR Model, OLSR Protocol, Optimized Link-State Routing Protocol
This slide contains concept about MPLS_VPNs specially L3_VPN protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
In the next slide, i prepare title about MPLS L3_VPN Services and VPLS (MPLS L2_VPN)
he Optimized Link State Routing Protocol (OLSR)[1] is an IP routing protocol optimized for mobile ad hoc networks, which can also be used on other wireless ad hoc networks. OLSR is a proactive link-state routing protocol, which uses hello and topology control (TC) messages to discover and then disseminate link state information throughout the mobile ad hoc network. Individual nodes use this topology information to compute next hop destinations for all nodes in the network using shortest hop forwarding paths.
The Optimized Link State Routing Protocol (OLSR) is an IP routing protocol optimized for mobile ad hoc networks, which can also be used on other wireless ad hoc networks. OLSR uses hello and topology control (TC) messages to discover and then disseminate link state information throughout the mobile ad hoc network.
Contents which are covered here:
Classification of Ad-Hoc Routing Protocol
Link State Routing
Problems of Link State Routing
Optimized Link State Routing Protocol
1 Hop and 2 Hop Neighbors
Hello Packet
MPR Selection
Topology Table
MPR Information Declaration
*** Animated figure/diagram might not be visible in PDF view. Please consider it. ***
OLSR Model, OLSR Protocol, Optimized Link-State Routing Protocol
This slide contains concept about MPLS_VPNs specially L3_VPN protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
In the next slide, i prepare title about MPLS L3_VPN Services and VPLS (MPLS L2_VPN)
Overview of Proxy Mobile IP for IPv6 mobility.
Mobile IP (MIP) allows mobile nodes to roam between networks while
keeping existing connections open thus allowing seamless operation
on application level.
However, Mobile IP requires additions to the OS kernel that make deployments
difficult if not impossible alltogether.
Proxy Mobile IPv6 (PMIPv6) allows mobility scenarios for non-MIP aware mobile nodes.
A proxy assumes all functionality required for mobile nodes to roam from
one wireless network to another. PMIPv6 achieves this with a Mobile Access Gateway
(MAG, the proxy) and a Local Mobility Anchor (LMA) that represents the single point of attachment
for corresponding nodes.
PMIPv6 is most suited for campus-type networks where all wireless networks are under
the control of a single authority.
Overview of Proxy Mobile IP for IPv6 mobility.
Mobile IP (MIP) allows mobile nodes to roam between networks while
keeping existing connections open thus allowing seamless operation
on application level.
However, Mobile IP requires additions to the OS kernel that make deployments
difficult if not impossible alltogether.
Proxy Mobile IPv6 (PMIPv6) allows mobility scenarios for non-MIP aware mobile nodes.
A proxy assumes all functionality required for mobile nodes to roam from
one wireless network to another. PMIPv6 achieves this with a Mobile Access Gateway
(MAG, the proxy) and a Local Mobility Anchor (LMA) that represents the single point of attachment
for corresponding nodes.
PMIPv6 is most suited for campus-type networks where all wireless networks are under
the control of a single authority.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
1. AODV Overview
• AODV is a packet routing protocol designed for use in mobile
ad hoc networks (MANET)
• Intended for networks that may contain thousands of nodes
• One of a class of demand-driven protocols
– The route discovery mechanism is invoked only if a route to a
destination is not known
• UDP is the transport layer protocol
• Source, destination and next hop are addressed using IP
addressing
• Each node maintains a routing table that contains information
about reaching destination nodes.
– Each entry is keyed to a destination node.
2. Routing Table Fields
• Destination IP address
• Destination Sequence Number
• Valid Destination Sequence Number Flag
• Other state and routing flags
• Network Interface
• Hop Count (needed to reach destination)
• Next Hop
• Precursor List
• Lifetime (route expiration or deletion time)
3. Overview (continued)
• Routing table size is minimized by only including next hop
information, not the entire route to a destination node.
• Sequence numbers for both destination and source are used.
• Managing the sequence number is the key to efficient routing
and route maintenance
– Sequence numbers are used to indicate the relative freshness of
routing information
– Updated by an originating node, e.g., at initiation of route discovery or
a route reply.
– Observed by other nodes to determine freshness.
4. Overview (continued)
• The basic message set consists of:
– RREQ – Route request
– RREP – Route reply
– RERR – Route error
– HELLO – For link status monitoring
5. AODV Operation – Message Types
• RREQ Messages
– While communication routes between nodes are valid,
AODV does not play any role.
– A RREQ message is broadcasted when a node needs to
discover a route to a destination.
– As a RREQ propagates through the network, intermediate
nodes use it to update their routing tables (in the direction
of the source node).
– The RREQ also contains the most recent sequence number
for the destination.
– A valid destination route must have a sequence number at
least as great as that contained in the RREQ.
7. AODV Operation – Message Types
• RREP Messages
– When a RREQ reaches a destination node, the destination
route is made available by unicasting a RREP back to the
source route.
– A node generates a RREP if:
• It is itself the destination.
• It has an active route to the destination. Ex: an intermediate node
may also respond with an RREP if it has a “fresh enough” route to
the destination.
– As the RREP propagates back to the source node,
intermediate nodes update their routing tables (in the
direction of the destination node).
9. AODV Operation – Message Types
• RERR Messages
– This message is broadcast for broken links
– Generated directly by a node or passed on when
received from another node
11. AODV Routing
• There are two phases
– Route Discovery.
– Route Maintenance.
• Each node maintains a routing table with knowledge about the network.
• AODV deals with route table management.
• Route information maintained even for short lived routes – reverse
pointers.
12. Entries in Routing Table
• Destination IP Address
• Destination Sequence Number
• Valid Destination Sequence Number flag
• Other state and routing flags (e.g., valid, invalid, repairable, being
repaired)
• Network Interface
• Hop Count (number of hops needed to reach destination)
• Next Hop
• List of Precursors
• Lifetime (expiration or deletion time of the route)
• DSR maintains additional table entries, causing a larger memory overhead
13. Discovery
• Broadcast RREQ messages.
• Intermediate nodes update their routing table
• Forward the RREQ if it is not the destination.
• Maintain back-pointer to the originator.
• Destination generates RREQ message.
• RREQ sent back to source using the reverse pointer set up
by the intermediate nodes.
• RREQ reaches destination, communication starts.
14. Algorithm for Discovery
• @Originator
• If a route to the destination is available, start sending data.
• Else generate a RREQ packet. Increment the RREQID by 1.Increment the
sequence number by 1.Destination IP address ,currently available
sequence number included.
• @Intermediate Node
• Generate route reply, if a 'fresh enough' route is a valid route entry for the
destination whose associated sequence number is at least as great as that
contained in the RREQ. Change the sequence number of the destination
node if stale, increment the hop count by 1 and forward.
• @Destination 1.Increment sequence number of the destination.
2.Generate a RREQ message and sent back to Originator.
15. Maintenance
• Hello messages broadcast by active nodes periodically
HELLO_INTERVAL.
• No hello message from a neighbor in DELETE_PERIOD,link
failure identified.
• A local route repair to that next hop initiated.
• After a timeout ,error propagated both to originator and
destination.
• Entries based on the node invalidated.
16. RERR Messages
– Message is broadcasted when:
i. A node detects that a link with adjacent neighbor is
broken (destination no longer reachable).
ii. If it gets a data packet destined to a node for which it
does not have an active route and is not repairing.
iii. If it receives a RERR from a neighbor for one or more
active routes.
17. RERR Processing (for above
broadcasts)
– Build Affected Destination Listing
i. List unreachable destinations containing unreachable neighbor
& destination using unreachable as next hop
ii. Only one unreachable destination, which node already has.
iii. List of nodes where RERR is next hop
– Update information
– Transmit RERR for each item listed
18. RERR – information update
– Destination Sequence #
- Update sequence # for case i and ii
- Copy sequence # for case iii
– Invalidate route entry
– Update Lifetime field as (currtime +
DELETE_PERIOD)
– Only now may route entry be deleted
19. RERR message transmission
– Unicast
- Send RERR to single recipient
– Unicast iteritive
- Send RERR to a number of recipients individually
– Broadcast
- Notify multiple recipients simultaniously
- Broadcast via 255.255.255.255 TTL = 1
20. RERR message transmission
– Unicast
• A node detects that a link with adjacent neighbor is
broken (destination no longer reachable).
• If it gets a data packet destined to a node for which it
does not have an active route and is not repairing.
• If it receives a RERR from a neighbor for one or more
active routes.
– Unicast iteritive
– Broadcast
21. OLSR Concepts
• Proactive (table-driven) routing protocol
– A route is available immediately when needed
• Based on the link-state algorithm
– Traditionally, all nodes flood neighbor information in a link-state
protocol, but not in OLSR
• Nodes advertise information only about links with neighbors
who are in its multipoint relay selector set
– Reduces size of control packets
• Reduces flooding by using only multipoint relay nodes to send
information in the network
– Reduces number of control packets by reducing duplicate transmissions
22. OLSR Concepts (2)
• Does not require reliable transfer, since
updates are sent periodically
• Does not need in-order delivery, since
sequence numbers are used to prevent out-of-
date information from being misinterpreted
• Uses hop-by-hop routing
– Routes are based on dynamic table entries
maintained at intermediate nodes
23. Multipoint Relays
• Each node N in the network selects a set of neighbor nodes as
multipoint relays, MPR(N), that retransmit control packets
from N
– Neighbors not in MPR(N) process control packets from N, but they do
not forward the packets
• MPR(N) is selected such that all two-hop neighbors of N are
covered by (one-hop neighbors) of MPR(N)
1
4
3
5
2
6
7
One optimal set for Node 4:
MPR(4) = { 3, 6 }
Is there another
optimal MPR(4)?
24. Multipoint Relay Selector Set
• The multipoint relay selector set for Node N, MS(N),
is the set of nodes that choose Node N in their
multipoint relay set
– Only links N-M, for all M such that NMS(M) will be
advertised in control messages
MS(3) = {…, 4, …}
MS(6) = {…, 4, …}
(Assuming bidirectional links)
1
4
3
5
2
6
7
25. HELLO Messages (1)
• Each node uses HELLO messages to determine its
MPR set
• All nodes periodically broadcast HELLO messages to
their one-hop neighbors (bidirectional links)
• HELLO messages are not forwarded
1
4
3
5
2
6
7
HELLO: NBR(4) = {1,3,5,6}
26. HELLO Messages (2)
• Using the neighbor list in received HELLO messages,
nodes can determine their two-hop neighborhood
and an optimal (or near-optimal) MPR set
• A sequence number is associated with this MPR set
– Sequence number is incremented each time a new set is
calculated
1
4
3
5
2
6
7
At Node 4:
NBR(1) = {2}
NBR(3) = {2,5}
NBR(5) = {3,6}
NBR(6) = {5,7}
MPR(4) = {3,6}
27. HELLO Messages (3)
• Subsequent HELLO messages also indicate neighbors
that are in the node’s MPR set
• MPR set is recalculated when a change in the
one-hop or two-hop neighborhood is detected
1
4
3
5
2
6
7
HELLO: NBR(4) = {1,3,5,6}, MPR(4) = {3,6}
MS(6) = {…, 4,…}
MS(3) = {…, 4,…}
28. TC Messages
• Nodes send topology information in Topology Control
(TC) messages
– List of advertised neighbors (link information)
– Sequence number (to prevent use of stale information)
• A node generates TC messages only for those
neighbors in its MS set
– Only MPR nodes generate TC messages
– Not all links are advertised
• A nodes processes all received TC messages, but only
forwards TC messages if the sender is in its MS set
– Only MPR nodes propagate TC messages
31. OLSR Example (3)
• Node 4 generates a TC message advertising nodes in
MS(4) = {1, 3, 5, 6}
• Nodes 3 and 6 forward TC(4) since Node 4 MS(3)
and Node 4 MS(6)
1
4
3
5
2
6
7
TC(4) = <1,3,5,6>
32. OLSR Example (4)
• Node 6 generates a TC message advertising nodes in
MS(6) = {4, 5, 7}
• Node 4 forwards TC(6) from Node 6 and Node 3
forwards TC(6) from Node 4
• After Nodes 3, 4, and 6 have generated TC messages,
all nodes have link-state information to route to any
node
1
4
3
5
2
6
7
TC(6) = <4,5,7>
33. OLSR Example (5)
• Given TC information, each node
forms a topology table
• A routing table is calculated from the
topology table
• Note that Link 1-2 is not visible except
to Nodes 2 and 3
TC(3) = <2,4,5>
TC(4) = <1,3,5,6>
TC(6) = <4,5,7>
1
3
5
2
6
7
4
Dest Next Hops
1 4 2
2 2 1
4 4 1
5 5 1
6 4 (5) 2
7 4 (5) 3